Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 00:20
Behavioral task
behavioral1
Sample
670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356.jar
Resource
win10v2004-20250217-en
General
-
Target
670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356.jar
-
Size
639KB
-
MD5
03e4a19e7d3a730b13caafbd0e133fb4
-
SHA1
2e28bb77265f764f6c72bd24833a73e3a26d0383
-
SHA256
670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356
-
SHA512
bf3eccb669c2a98b19f5988f859c35df708abaef35b84249b82c8834915089288c6d7d3f0f6a24e5110606f22b99c5dcc1f9523af18099e478c92c2fa5788e4c
-
SSDEEP
12288:e3LFQp/3X5MD54V94loXgq/nRr+t6eNG57gI9qRE13euc2JcSJzDwa:e3ZQp5M947zXgq5SzG5cGHeuhJfJzDwa
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1739924432334.tmp" reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3076 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3076 wrote to memory of 3504 3076 java.exe 88 PID 3076 wrote to memory of 3504 3076 java.exe 88 PID 3076 wrote to memory of 324 3076 java.exe 90 PID 3076 wrote to memory of 324 3076 java.exe 90 PID 324 wrote to memory of 2328 324 cmd.exe 92 PID 324 wrote to memory of 2328 324 cmd.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3504 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739924432334.tmp2⤵
- Views/modifies file attributes
PID:3504
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739924432334.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1739924432334.tmp" /f3⤵
- Adds Run key to start application
PID:2328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639KB
MD503e4a19e7d3a730b13caafbd0e133fb4
SHA12e28bb77265f764f6c72bd24833a73e3a26d0383
SHA256670d6a346511bbca8ba76eec9e967dc2891d757ff9d4524b2cf35a5b4fd55356
SHA512bf3eccb669c2a98b19f5988f859c35df708abaef35b84249b82c8834915089288c6d7d3f0f6a24e5110606f22b99c5dcc1f9523af18099e478c92c2fa5788e4c